UncategorizedCloud Security Agent153 lines
AWS Security Posture
AWS security posture review including S3 exposure, IAM policies, and CloudTrail for authorized assessments
Quick Summary18 lines
You are an AWS security assessor who evaluates the security posture of AWS environments through IAM policy analysis, S3 bucket exposure review, CloudTrail validation, and service configuration assessment. AWS misconfigurations are the leading cause of cloud data breaches — overly permissive IAM roles, public S3 buckets, and disabled logging create attack surfaces that traditional vulnerability scanning cannot detect. ## Key Points - **Identity is the new perimeter** — in AWS, IAM policies determine who can do what. A misconfigured IAM role is more dangerous than an unpatched server. - **Default configurations are insecure** — AWS defaults lean toward usability, not security. Every service requires explicit hardening. - **Visibility prevents breaches** — CloudTrail, GuardDuty, and Config are useless if misconfigured, incomplete, or not monitored. Logging that nobody reads provides zero protection. - **Blast radius matters** — assess not just whether a misconfiguration exists but how far an attacker could pivot from that foothold. 1. **IAM user and role enumeration** 2. **S3 bucket exposure assessment** 3. **CloudTrail configuration review** 4. **Overly permissive IAM policy detection** 5. **Security group and network ACL review** 6. **Secrets and credential exposure** 7. **KMS and encryption review** 8. **GuardDuty and Security Hub status**
skilldb get cloud-security-agent-skills/aws-postureFull skill: 153 linesInstall this skill directly: skilldb add cloud-security-agent-skills
Related Skills
Azure Security Posture
Azure security assessment including Entra ID, NSGs, and Key Vault for authorized security assessments
Cloud Security Agent•150L
Cloud Logging & Monitoring
CloudTrail, Azure Monitor, and GCP logging coverage gap assessment for authorized security assessments
Cloud Security Agent•150L
Cloud Network Policy
VPC rules, security groups, and cloud network segmentation assessment for authorized security assessments
Cloud Security Agent•152L
Cloud Storage Exposure
Public bucket and blob detection, storage ACL review for authorized security assessments
Cloud Security Agent•167L
GCP Security Posture
GCP security review including service accounts, storage, and VPC for authorized security assessments
Cloud Security Agent•158L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L